Splunk Enterprise

KVstore stopped working, stuck in starting, not connecting to other shcluster members, related to server.pem

Glasses2
Communicator

Hi,
I recently had an issue where my SHCluster was throwing Kvstore errors.
The Kvstore status was abnormal.
The resolution was checking the server.pem expiration date in /opt/splunk/etc/auth
use >>> openssl x509 -in /opt/splunk/etc/auth/server.pem -noout -text
After removing the server.pem and restarting, Kvstore was back up.

Does anyone have a way to monitor the expiration dates for all the server.pem(s) in the deployment?

Thanks

Labels (2)
0 Karma

livehybrid
Super Champion

Hi @Glasses2 

Im glad you managed to fix your mongo issue - Not the first time SSL expiry has caught people out!

There is an app "SSL Certificate Checker" on Splunkbase at https://splunkbase.splunk.com/app/3172 which looks to solve this. You configure it with the path of the certificates you wish to monitor on a Splunk host and it reports the expiry into Splunk for you to create an alert for. Setting up for /opt/splunk/etc/auth/ should capture most things unless you have other custom certs in use.

🌟 Did this answer help you? If so, please consider:

  • Adding karma to show it was useful
  • Marking it as the solution if it resolved your issue
  • Commenting if you need any clarification

Your feedback encourages the volunteers in this community to continue contributing

0 Karma
Get Updates on the Splunk Community!

.conf25 Registration is OPEN!

Ready. Set. Splunk! Your favorite Splunk user event is back and better than ever. Get ready for more technical ...

Detecting Cross-Channel Fraud with Splunk

This article is the final installment in our three-part series exploring fraud detection techniques using ...

Splunk at Cisco Live 2025: Learning, Innovation, and a Little Bit of Mr. Brightside

Pack your bags (and maybe your dancing shoes)—Cisco Live is heading to San Diego, June 8–12, 2025, and Splunk ...